CN101860525A - Realizing method of electronic authorization warrant, intelligent terminal, authorization system and verification terminal - Google Patents

Realizing method of electronic authorization warrant, intelligent terminal, authorization system and verification terminal Download PDF

Info

Publication number
CN101860525A
CN101860525A CN200910190623A CN200910190623A CN101860525A CN 101860525 A CN101860525 A CN 101860525A CN 200910190623 A CN200910190623 A CN 200910190623A CN 200910190623 A CN200910190623 A CN 200910190623A CN 101860525 A CN101860525 A CN 101860525A
Authority
CN
China
Prior art keywords
shape
user
mandate
subscriber identity
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN200910190623A
Other languages
Chinese (zh)
Other versions
CN101860525B (en
Inventor
饶俊峰
郝昌富
姚志文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Nationz Electronic Commerce Co., Ltd.
Original Assignee
Shenzhen Angelshine Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Angelshine Co Ltd filed Critical Shenzhen Angelshine Co Ltd
Priority to CN2009101906239A priority Critical patent/CN101860525B/en
Publication of CN101860525A publication Critical patent/CN101860525A/en
Application granted granted Critical
Publication of CN101860525B publication Critical patent/CN101860525B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention provides a realizing method of an electronic authorization warrant, an intelligent terminal, an authorization system and a verification terminal, including an intelligent terminal with a user identity, an authorization system, a user management center and a verification terminal. The realizing method comprises the following steps of: applying authorization and using authorization. The realizing method of the electronic authorization warrant, the intelligent terminal, the authorization system and the verification terminal realize the electronic authorization warrant by adopting a public key cryptography technology, and the use security is improved because user identity information is contained in the electronic authorization warrant, and the user identity and the signature are authorized by the verification terminal. Moreover, the user can apply the electronic authorization warrant through a short message, store the electronic authorization warrant in the verification terminal and is simple and convenient to use the electronic authorization warrant through a smart card identifying the identity or an intelligent terminal (such as a mobile phone) with an embedded smart card.

Description

Electronic authorization shape implementation method, intelligent terminal, authoring system and verification terminal
Technical field
The present invention relates to smart card, information security field, be specifically related to a kind of electronic authorization shape implementation method, intelligent terminal, authoring system and verification terminal based on terminal storage.
Background technology
Be present in network, smart card, intelligent terminal with digital form, the bill that reads and verify with specific equipment is called electronic ticket (or claiming service evidence, electronic authorization shape).Electronic ticket can be provided and transmits by modes such as the Internet, radio communications, have buy convenient, draw a bill and characteristics such as selling cost is low.And the fail safe of electronics is the core difficult point of electronic ticket large-scale application, is very important so adopt safe cryptographic technique.
And modern cryptographic technique is divided into two classes according to the characteristics of key: symmetric cryptographic technique and asymmetric cryptographic technique:
One: symmetric cryptographic technique
Symmetric cryptographic technique is that decruption key is identical with encryption key, and in this system, the distribution of key is a difficult point in using.
Two: asymmetric cryptographic technique
Asymmetric cryptographic technique is public key cryptography technology again, and in common key cryptosystem, the user has two keys, one open (PKI), another user privately owned (private key) is difficult to release another from one, and communicating pair need not prior interchange key just can set up secure communication.The certificate mechanism that generally all adopts traditional public key cryptosyst realizes that user's identity and user's the safety of key is corresponding.Certificate mechanism generally all adopts PKIX (Public Key Infrastructure:PKI) technology.It has comprehensively used multinomial safe practices and such as digital digest, digital signature to overlap complete certificate management mechanism security service is provided.The authentication center (Certification Authority:CA) that system need build public credibility identifies user identity, signs and issues digital certificate for the user then.Digital certificate binds together user identity and user key safely.The user exchanges certificate earlier in operation system, use public and private key to finish operations such as user's authentication, access control, information security transmission then.
In order to reduce the complexity of key management and use in the public key cryptosyst, Shamir is at 1984[S84] year the cryptographic technique (Identity-Based Cryptography:IBC) based on sign has been proposed: promptly user's sign just can be used as user's PKI (PKI that more precisely is the user can calculate from user's a sign and a method of system's appointment).In this case, the user does not need application and exchange certificate, thereby has simplified the complexity of cryptographic system management.User's private key uses sign private key generating algorithm to calculate by a third party who is trusted in the system (key generation center) and generates.Such system has natural password and entrusts function, is suitable for having the applied environment of supervision.
But prior art just reads identification information from user's smart card (or two-dimension code), lacks the authentication information that the user uses identification information, and fail safe is not high enough, can not be applied to strong safety requirements or responsive application scenario.
Thereby prior art is still waiting to improve and improve.
Summary of the invention
In view of above-mentioned the deficiencies in the prior art part, the object of the present invention is to provide a kind of electronic authorization shape implementation method, intelligent terminal, authoring system and verification terminal based on terminal storage, it has increased the authentication information that the user uses identification information, improved the fail safe of using, easy to use, be specially adapted to strong safety requirements or responsive application scenario.
In order to achieve the above object, the present invention has taked following technical scheme:
A kind of electronic authorization shape implementation method based on terminal storage, be applied to electronic management system, comprise intelligent terminal, authoring system, user management center and the verification terminal of being with user ID, wherein, described implementation method comprises the application mandate, and described application mandate comprises step:
The intelligent terminal of described band user ID receives and the storage subscriber identity data;
Described intelligent terminal sends to authoring system application mandate shape with subscriber identity data;
Described authoring system receives described subscriber identity data;
Described authoring system extracts and the corresponding client public key data of described subscriber identity data to the user management center;
Described authoring system generates and stores the mandate shape that contains subscriber identity data, client public key data;
Described authoring system sends to described intelligent terminal by note with the affirmation information of described mandate shape;
Described intelligent terminal receives the affirmation information of described mandate shape;
Described verification terminal receives and stores the mandate shape that contains subscriber identity data, client public key data from described authoring system.
Described electronic authorization shape implementation method, wherein, it also comprises use authority, described use authority comprises step:
Described verification terminal sends the order of reading subscriber identity data;
Described intelligent terminal receives described order and the generation random number of reading subscriber identity data of storage;
Described portable terminal sends to described verification terminal with described subscriber identity data and random number;
Described verification terminal is searched the corresponding grant shape according to described subscriber identity data;
Described verification terminal becomes to have first ciphertext of authentication according to the client public key data in the mandate shape of being found with described random number encryption;
Described verification terminal sends to described intelligent terminal with described first ciphertext and an additional identification information;
Described intelligent terminal receives described first ciphertext and described additional identification information, and deciphers described first ciphertext and check the interior random number of described first ciphertext;
Described intelligent terminal becomes to have second ciphertext of authentication to described additional identification information encryption with private key signature;
Described verification terminal receives described second ciphertext and verifies described signature;
Described verification terminal checking is passed through and is carried out and authorize and write down the user's signature data of authorizing.
Described electronic authorization shape implementation method, wherein, it also comprises the cancellation mandate; Described cancellation mandate comprises step:
Described intelligent terminal receives user's cancellation mandate shape request and private key for user signature, and described cancellation mandate shape request and private key for user signature are sent to described authoring system
Described authoring system receives described cancellation mandate shape request and private key for user signature, and checks described private key for user signature;
Described authoring system upgrades local data base;
Described verification terminal is new database more;
After finishing cancellation, described authoring system sends cancellation to described intelligent terminal and authorizes shape information.
Described electronic authorization shape implementation method, wherein, terminal date, time, terminal number that described additional identification information is the user's signature data.
A kind of intelligent terminal wherein, comprising:
First receives and memory cell, is used for receiving and storage subscriber identity data and public and private key;
First transmitting element is used for described subscriber identity data is sent to authoring system application mandate shape;
First receiving element is used to receive the affirmation information of described mandate shape;
Second receives and memory cell, is used to receive the order of reading subscriber identity data and produces random number;
Second transmitting element is used for described subscriber identity data and random number are sent to verification terminal;
Receive and decrypting device, be used to receive first ciphertext and an additional identification information, and decipher described first ciphertext and check the interior random number of described first ciphertext;
Second ciphering unit is used for becoming to have with the private key signature data encryption second ciphertext of authentication.
Described intelligent terminal, wherein, it also comprises: cancel request unit, be used to receive user's cancellation mandate shape request and private key for user signature, and described cancellation mandate shape request and private key for user signature are sent to described authoring system.
A kind of authoring system wherein, comprising:
Receive and authentication unit, be used for receiving and the checking subscriber identity data;
Extraction unit is used for extracting and the corresponding client public key data of subscriber identity data to the user management center;
Authorize shape to generate and memory cell, be used to generate and store the mandate shape that contains subscriber identity data, client public key data;
The authorization message transmitting element is used for by note the affirmation information of described mandate shape being sent to described intelligent terminal;
The cancellation performance element is used to receive cancellation mandate shape request and the private key for user signature that intelligent terminal is sent, and checks described private key for user signature, carries out cancellation and authorizes shape, and local data base upgrades in time.
A kind of verification terminal wherein, comprising:
Authorize shape to receive and memory cell: to be used for receiving and store the mandate shape that contains subscriber identity data, client public key data from authoring system;
Read to identify transmitting element, be used to send the order of reading subscriber identity data;
Authorize shape to search the unit: to be used for searching the corresponding grant shape according to described subscriber identity data;
First ciphering unit is used for the client public key data according to the mandate shape of being found, and random number encryption is become to have first ciphertext of authentication;
The first ciphertext transmitting element is used for described first ciphertext and an additional identification information are sent to intelligent terminal;
Receive and authentication unit, be used to receive second ciphertext and verify the user's signature data;
Be authorized performance element, be used for checking by and carry out and authorize, and record user's signature data of authorizing.
Described verification terminal, wherein, it also comprises: cancellation data updating unit, the mandate shape data message of the user's cancellation that is used to upgrade in time.
A kind of electronic authorization shape implementation method, intelligent terminal, authoring system and verification terminal provided by the invention based on terminal storage, adopt public key cryptography technology to realize described electronic authorization shape, authorize in the shape subscriber identity information is arranged, verification terminal is verified by sign and signature to the user, has improved the fail safe of using; And the user just can apply for authorizing shape by note, and authorizes shape to be stored in verification terminal, and the user holds the smart card of sign identity, or the intelligent terminal of embedded smart card, and (as mobile phone) use authority shape is easy to use.
Description of drawings
Fig. 1 be the embodiment of the invention provide based on application authorization flow figure in the electronic authorization shape implementation method of terminal storage;
Fig. 2 be the embodiment of the invention provide based on use authority flow chart in the electronic authorization shape implementation method of terminal storage;
The intelligent terminal structural representation that Fig. 3 provides for the embodiment of the invention;
The authoring system structural representation that Fig. 4 provides for the embodiment of the invention;
The structural representation of the verification terminal that Fig. 5 provides for the embodiment of the invention.
Embodiment
The embodiment of the invention provides a kind of electronic authorization shape implementation method, intelligent terminal, authoring system and verification terminal based on terminal storage, adopt public key cryptography technology to realize described electronic authorization shape, adopt public key cryptography technology to realize authorizing shape, authorize shape to be stored in verification terminal, the user holds the smart card of sign identity, or the intelligent terminal of embedded smart card, (as mobile phone) use authority shape, easy to use.Authorize the shape implementation method to comprise application mandate, use authority, cancellation mandate etc.For making purpose of the present invention, technical scheme and advantage clearer, clear and definite, below the utility model is further described with reference to the accompanying drawing embodiment that develops simultaneously.
The embodiment of the invention provides a kind of electronic authorization shape implementation method based on terminal storage, be applied to electronic management system, comprise intelligent terminal, authoring system, user management center and the verification terminal of being with user ID, wherein, as shown in Figure 1, described application mandate comprises step:
101, the user gets or enough buys the user smart card of being with user totem information to the user management center, or on the intelligent terminal of packing into (as mobile phone) of smart card.
102, when the user will apply for authorizing shape, described intelligent terminal sends to authoring system application mandate shape with described subscriber identity data.
103, described authoring system receives and verifies described subscriber identity data, and whether decision meets the condition of being authorized, and is authorized then execution in step 104 if meet; Otherwise execution in step 108.
104, described authoring system extracts and the corresponding client public key data of subscriber identity data to the user management center.
105, described authoring system generates and stores the mandate shape that contains subscriber identity data, client public key data; And the affirmation information of described mandate shape is sent to described intelligent terminal, the success of notice subscriber authorisation by note.
106, described verification terminal receives and storage contains the mandate shape of subscriber identity data, client public key data from described authoring system, and described mandate shape is downloaded to verification terminal.
107, described intelligent terminal receives the affirmation information (successfully waiting confirmation as applying for authorizing) of described mandate shape.
108, when the against regulation condition of user applies mandate, do corresponding failure and handle.
Described use authority comprises step: as shown in Figure 2;
201, described verification terminal sends the order of reading subscriber identity data to user's intelligent terminal.
202, described intelligent terminal receives described order and the generation random number of reading subscriber identity data of storage.
203, described portable terminal sends to described verification terminal with described subscriber identity data and random number.
204, described verification terminal is searched the corresponding grant shape according to described subscriber identity data, if find corresponding mandate shape, then execution in step 205; Otherwise execution in step 210.
205, described verification terminal is according to the client public key data in the mandate shape of being found, described random number encryption is become to have first ciphertext of authentication, and with described first ciphertext and an additional identification information, intelligent terminal as described in sending to as terminal date, time, terminal number etc.
206, described intelligent terminal receives described additional identification information, and deciphers described first ciphertext and check the interior random number of described first ciphertext, if decipher and check correctly, then execution in step 207; Otherwise execution in step 210.
207, described intelligent terminal becomes to have second ciphertext of authentication to described additional identification information encryption with private key signature; And described second ciphertext sent back to verification terminal.
208, described verification terminal receives described second ciphertext and verifies described user's signature data; If checking is correct, then execution in step 209, otherwise execution in step 210.
209, described verification terminal checking is passed through and is carried out and authorize and write down the user's signature data of authorizing.
210, doing corresponding failure handles.
Further embodiment, the electronic authorization shape implementation method based on terminal storage of the present invention when described user thinks that cancellation is authorized, also comprises the cancellation mandate, described cancellation mandate comprises step:
A, user propose cancellation to authorization center and authorize the shape requirement, and cancellation requires to sign with private key for user;
B, authorization center are checked signature, and be correct, upgrades local data base, upgrades the verification terminal data;
C, notify the user to cancel success.
Below be that preferred embodiment is described in detail the electronic authorization shape implementation method that the present invention is based on terminal storage to order film ticket:
The first step, user select " order film ticket " on mobile phone wallet STK menu, select movie theatre, date and film, and mobile phone is pressed form as " 20090808F08 " with it, sends to movie theatre by note.
Second step, movie theatre are confirmed the supply of tickets, and ticket fee and user mobile phone number are sent to the mobile phone wallet center, and the user is notified at the wallet center paying ticket fee.
The 3rd step, user receive payment information, confirm payment, after the mobile phone wallet center is paid successfully, and the notice movie theatre.
The 4th step, after movie theatre receives the ticket fee payment affirmation, from user management center application PKI, and to generate with the user mobile phone number be the film ticket mandate shape that sign comprises information such as client public key, date, entrance hall, seat, the SMS notification user " books tickets successfully ".
The 5th step, film ticket mandate shape download to the ticket checking terminal of specifying the entrance hall.
The 6th step, user enter movie theatre, hold mobile phone and brush in ticket checking terminal, and ticket checking terminal is read cell-phone number and random number, searches the film ticket mandate shape of cell-phone number correspondence, count at any time with public key encryption in the mandate shape, send mobile phone with terminal date, time, terminal number.
After the 7th step, the mobile phone checking random number,, return terminal with encrypted private key terminal date, time, terminal number.
The 8th step, terminal certifying signature, correct, mandate is passed through, and opens banister, and the user enters Movie House.
Based on said method, the embodiment of the invention is corresponding to provide a kind of intelligent terminal, and as shown in Figure 3, it comprises:
First receives and memory cell 301, is used for receiving and storage subscriber identity data and public and private key;
First transmitting element 302 is used for described subscriber identity data is sent to authoring system application mandate shape;
First receiving element 303 is used to receive the affirmation information of described mandate shape;
Second receives and memory cell 304, is used to receive storage and reads the order of subscriber identity data and produce random number;
Second transmitting element 305 is used for described subscriber identity data and random number are sent to verification terminal;
Receive and decrypting device 306, be used to receive first ciphertext and terminal date, time, terminal number, and decipher described first ciphertext and check the interior random number of described first ciphertext;
Second ciphering unit 307 is used for private key user's signature data described terminal date, time, terminal number being encrypted to second ciphertext of authentication.
In a further embodiment, this intelligent terminal also comprises: cancel request unit 308, be used to receive user's cancellation mandate shape request and private key for user signature, and described cancellation mandate shape request and private key for user signature are sent to described authoring system.
Based on said method, the embodiment of the invention also provides a kind of authoring system, and as shown in Figure 4, it comprises:
Receive and authentication unit 401, be used for receiving and the checking subscriber identity data;
Extraction unit 402 is used for extracting and the corresponding client public key data of subscriber identity data to the user management center;
Authorize shape to generate and memory cell 403, be used to generate and store the mandate shape that contains subscriber identity data, client public key data;
Authorization message transmitting element 404 is used for by note the affirmation information of described mandate shape being sent to described intelligent terminal;
Cancellation performance element 405 is used to receive cancellation mandate shape request and the private key for user signature that intelligent terminal is sent, and checks described private key for user signature, carries out cancellation and authorizes shape, and local data base upgrades in time.
Based on said method, the embodiment of the invention also provides a kind of verification terminal, and as shown in Figure 5, it comprises:
Authorize shape to receive and memory cell 501: to be used for receiving and store the mandate shape that contains subscriber identity data, client public key data from authoring system;
Read to identify transmitting element 502, be used to send the order of reading subscriber identity data;
Authorize shape to search unit 503: to be used for searching the corresponding grant shape according to described subscriber identity data;
First ciphering unit 504 is used for the client public key data according to the mandate shape of being found, and random number encryption is become to have first ciphertext of authentication;
The first ciphertext transmitting element 505 is used for described first ciphertext and terminal date, time, terminal number are sent to intelligent terminal;
Receive and authentication unit 506, be used to receive second ciphertext and verify the user's signature data;
Be authorized performance element 507, be used for checking by and carry out and authorize, and record user's signature data of authorizing.
In a further embodiment, this verification terminal also comprises: cancellation data updating unit 508, the mandate shape data message of the user's cancellation that is used to upgrade in time.
A kind of electronic authorization shape implementation method, intelligent terminal, authoring system and verification terminal provided by the invention based on terminal storage, adopt public key cryptography technology to realize described electronic authorization shape, authorize in the shape subscriber identity information is arranged, verification terminal is verified by sign and signature to the user, has improved the fail safe of using; And the user just can apply for authorizing shape by note, and authorizes shape to be stored in verification terminal, and the user holds the smart card of sign identity, or the intelligent terminal of embedded smart card, and (as mobile phone) use authority shape is easy to use.
Should be understood that, for those of ordinary skills, can be improved according to the above description or conversion, and all these improvement and conversion all should belong to the protection range of claims of the present invention.

Claims (9)

1. electronic authorization shape implementation method based on terminal storage, be applied to electronic management system, comprise intelligent terminal, authoring system, user management center and the verification terminal of being with user ID, it is characterized in that, described implementation method comprises the application mandate, and described application mandate comprises step:
The intelligent terminal storage subscriber identity data of described band user ID;
Described intelligent terminal sends to authoring system application mandate shape with subscriber identity data;
Described authoring system receives described subscriber identity data;
Described authoring system extracts and the corresponding client public key data of described subscriber identity data to the user management center;
Described authoring system generates and stores the mandate shape that contains subscriber identity data, client public key data;
Described authoring system sends to described intelligent terminal by note with the affirmation information of described mandate shape;
Described intelligent terminal receives the affirmation information of described mandate shape;
Described verification terminal receives and stores the mandate shape that contains subscriber identity data, client public key data from described authoring system.
2. electronic authorization shape implementation method according to claim 1 is characterized in that it also comprises use authority, and described use authority comprises step:
Described verification terminal sends the order of reading subscriber identity data;
Described intelligent terminal receives described order and the generation random number of reading subscriber identity data of storage;
Described intelligent terminal sends to described verification terminal with described subscriber identity data and random number;
Described verification terminal is searched the corresponding grant shape according to described subscriber identity data;
Described verification terminal becomes to have first ciphertext of authentication according to the client public key data in the mandate shape of being found with described random number encryption;
Described verification terminal sends to described intelligent terminal with described first ciphertext and an additional identification information;
Described intelligent terminal receives described first ciphertext and described additional identification information, and deciphers described first ciphertext and check the interior random number of described first ciphertext;
Described intelligent terminal becomes to have second ciphertext of authentication to described additional identification information encryption with private key signature;
Described verification terminal receives described second ciphertext and verifies described signature;
Described verification terminal checking is passed through and is carried out and authorize and write down the user's signature data of authorizing.
3. electronic authorization shape implementation method according to claim 1 is characterized in that, it also comprises the cancellation mandate; Described cancellation mandate comprises step:
Described intelligent terminal receives user's cancellation mandate shape request and private key for user signature, and described cancellation mandate shape request and private key for user signature are sent to described authoring system
Described authoring system receives described cancellation mandate shape request and private key for user signature, and checks described private key for user signature;
Described authoring system upgrades local data base;
Described verification terminal is new database more;
After finishing cancellation, described authoring system sends cancellation to described intelligent terminal and authorizes shape information.
4. electronic authorization shape implementation method according to claim 2 is characterized in that, terminal date, time, terminal number that described additional identification information is the user's signature data.
5. an intelligent terminal is characterized in that, comprising:
First receives and memory cell, is used for receiving and storage subscriber identity data and public and private key;
First transmitting element is used for described subscriber identity data is sent to authoring system application mandate shape;
First receiving element is used to receive the affirmation information of described mandate shape;
Second receives and memory cell, is used to receive the order of reading subscriber identity data and produces random number;
Second transmitting element is used for described subscriber identity data and random number are sent to verification terminal;
Receive and decrypting device, be used to receive first ciphertext and an additional identification information, and decipher described first ciphertext and check the interior random number of described first ciphertext;
Second ciphering unit is used for becoming to have with the private key signature data encryption second ciphertext of authentication.
6. intelligent terminal according to claim 5, it is characterized in that, it also comprises: cancel request unit, be used to receive user's cancellation mandate shape request and private key for user signature, and described cancellation mandate shape request and private key for user signature are sent to described authoring system.
7. an authoring system is characterized in that, comprising:
Receive and authentication unit, be used for receiving and the checking subscriber identity data;
Extraction unit is used for extracting and the corresponding client public key data of subscriber identity data to the user management center;
Authorize shape to generate and memory cell, be used to generate and store the mandate shape that contains subscriber identity data, client public key data;
The authorization message transmitting element is used for by note the affirmation information of described mandate shape being sent to described intelligent terminal;
The cancellation performance element is used to receive cancellation mandate shape request and the private key for user signature that intelligent terminal is sent, and checks described private key for user signature, carries out cancellation and authorizes shape, and local data base upgrades in time.
8. a verification terminal is characterized in that, comprising:
Authorize shape to receive and memory cell: to be used for receiving and store the mandate shape that contains subscriber identity data, client public key data from authoring system;
Read to identify transmitting element, be used to send the order of reading subscriber identity data;
Authorize shape to search the unit: to be used for searching the corresponding grant shape according to described subscriber identity data;
First ciphering unit is used for the client public key data according to the mandate shape of being found, and random number encryption is become to have first ciphertext of authentication;
The first ciphertext transmitting element is used for described first ciphertext and an additional identification information are sent to intelligent terminal;
Receive and authentication unit, be used to receive second ciphertext and verify the user's signature data;
Be authorized performance element, be used for checking by and carry out and authorize, and record user's signature data of authorizing.
9. verification terminal according to claim 8 is characterized in that it also comprises: cancellation data updating unit, the mandate shape data message of the user's cancellation that is used to upgrade in time.
CN2009101906239A 2009-09-25 2009-09-25 Realizing method of electronic authorization warrant, intelligent terminal, authorization system and verification terminal Expired - Fee Related CN101860525B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009101906239A CN101860525B (en) 2009-09-25 2009-09-25 Realizing method of electronic authorization warrant, intelligent terminal, authorization system and verification terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009101906239A CN101860525B (en) 2009-09-25 2009-09-25 Realizing method of electronic authorization warrant, intelligent terminal, authorization system and verification terminal

Publications (2)

Publication Number Publication Date
CN101860525A true CN101860525A (en) 2010-10-13
CN101860525B CN101860525B (en) 2012-11-14

Family

ID=42946185

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009101906239A Expired - Fee Related CN101860525B (en) 2009-09-25 2009-09-25 Realizing method of electronic authorization warrant, intelligent terminal, authorization system and verification terminal

Country Status (1)

Country Link
CN (1) CN101860525B (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103139774A (en) * 2011-11-30 2013-06-05 中国联合网络通信集团有限公司 Short message service processing method and short message service processing system
CN103854180A (en) * 2012-12-05 2014-06-11 中国银联股份有限公司 Credit voucher generating method and system, and application authorization method and system
CN103942684A (en) * 2014-04-25 2014-07-23 天地融科技股份有限公司 Data security interactive system
CN103942686A (en) * 2014-04-25 2014-07-23 天地融科技股份有限公司 Data security interactive system
CN103942685A (en) * 2014-04-25 2014-07-23 天地融科技股份有限公司 Data security interactive system
CN106529216A (en) * 2016-10-27 2017-03-22 西安交通大学 Software authorization system based on public storage platforms and software authorization method
CN106603486A (en) * 2016-11-03 2017-04-26 厦门雅迅网络股份有限公司 Mobile terminal safety authorization method and system
CN107070909A (en) * 2017-04-01 2017-08-18 广东欧珀移动通信有限公司 Method for sending information, message receiving method, apparatus and system
CN107995200A (en) * 2017-12-07 2018-05-04 深圳市优友互联有限公司 A kind of certificate issuance method, identity identifying method and system based on smart card
CN108664798A (en) * 2017-03-31 2018-10-16 北京京东尚科信息技术有限公司 Information ciphering method and device
CN109068326A (en) * 2018-07-24 2018-12-21 腾讯科技(深圳)有限公司 A kind of authentication method, device, terminal, storage medium and system
CN110119946A (en) * 2018-02-05 2019-08-13 库币科技有限公司 The pairing authentication method of electronic transaction device
CN111224784A (en) * 2019-11-27 2020-06-02 北京工业大学 Role separation distributed authentication and authorization method based on hardware trusted root
CN111710404A (en) * 2020-05-31 2020-09-25 南京麦澜德医疗科技有限公司 Method for authorizing and using equipment

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7519560B2 (en) * 2002-05-24 2009-04-14 Jpmorgan Chase Bank, N.A. System and method for electronic authorization of batch checks
CN100492966C (en) * 2004-11-26 2009-05-27 王小矿 Identity certifying system based on intelligent card and dynamic coding
CN101247189B (en) * 2008-03-07 2013-07-31 北京握奇数据系统有限公司 Receiving terminal and device for terminal implementing service authorization in conditioned receiving system
EP2104269A1 (en) * 2008-03-17 2009-09-23 Robert Bosch Gmbh An electronic control unit (ECU) and a method for verifying data integrity
CN201286105Y (en) * 2008-07-16 2009-08-05 上海方立数码科技有限公司 Identity authentication system combining fingerprint recognition with PKI system
CN101504732B (en) * 2009-03-13 2010-12-01 华中科技大学 Electronic passport expansion access control system and authentication method based on identification cipher technology

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103139774A (en) * 2011-11-30 2013-06-05 中国联合网络通信集团有限公司 Short message service processing method and short message service processing system
CN103139774B (en) * 2011-11-30 2015-10-14 中国联合网络通信集团有限公司 Short message service processing method and short message service treatment system
CN103854180A (en) * 2012-12-05 2014-06-11 中国银联股份有限公司 Credit voucher generating method and system, and application authorization method and system
CN103854180B (en) * 2012-12-05 2017-04-19 中国银联股份有限公司 Credit voucher generating method and system, and application authorization method and system
CN103942684A (en) * 2014-04-25 2014-07-23 天地融科技股份有限公司 Data security interactive system
CN103942686A (en) * 2014-04-25 2014-07-23 天地融科技股份有限公司 Data security interactive system
CN103942685A (en) * 2014-04-25 2014-07-23 天地融科技股份有限公司 Data security interactive system
CN106529216A (en) * 2016-10-27 2017-03-22 西安交通大学 Software authorization system based on public storage platforms and software authorization method
CN106529216B (en) * 2016-10-27 2022-04-22 西安交通大学 Software authorization system and software authorization method based on public storage platform
CN106603486B (en) * 2016-11-03 2021-09-07 厦门雅迅网络股份有限公司 Method and system for security authorization of mobile terminal
CN106603486A (en) * 2016-11-03 2017-04-26 厦门雅迅网络股份有限公司 Mobile terminal safety authorization method and system
CN108664798B (en) * 2017-03-31 2021-06-29 北京京东尚科信息技术有限公司 Information encryption method and device
CN108664798A (en) * 2017-03-31 2018-10-16 北京京东尚科信息技术有限公司 Information ciphering method and device
US11194917B2 (en) 2017-03-31 2021-12-07 Beijing Jingdong Shangke Information Technology Co., Ltd. Information encryption method and device
CN107070909A (en) * 2017-04-01 2017-08-18 广东欧珀移动通信有限公司 Method for sending information, message receiving method, apparatus and system
CN107995200A (en) * 2017-12-07 2018-05-04 深圳市优友互联有限公司 A kind of certificate issuance method, identity identifying method and system based on smart card
CN110119946A (en) * 2018-02-05 2019-08-13 库币科技有限公司 The pairing authentication method of electronic transaction device
CN110119946B (en) * 2018-02-05 2022-12-13 库币科技有限公司 Pairing authentication method for electronic transaction device
CN109068326B (en) * 2018-07-24 2020-07-31 腾讯科技(深圳)有限公司 Authentication method, device, terminal, storage medium and system
CN109068326A (en) * 2018-07-24 2018-12-21 腾讯科技(深圳)有限公司 A kind of authentication method, device, terminal, storage medium and system
CN111224784A (en) * 2019-11-27 2020-06-02 北京工业大学 Role separation distributed authentication and authorization method based on hardware trusted root
CN111224784B (en) * 2019-11-27 2023-01-31 北京工业大学 Role separation distributed authentication and authorization method based on hardware trusted root
CN111710404A (en) * 2020-05-31 2020-09-25 南京麦澜德医疗科技有限公司 Method for authorizing and using equipment
CN111710404B (en) * 2020-05-31 2024-01-23 南京麦澜德医疗科技股份有限公司 Equipment authorization using method

Also Published As

Publication number Publication date
CN101860525B (en) 2012-11-14

Similar Documents

Publication Publication Date Title
CN101860525B (en) Realizing method of electronic authorization warrant, intelligent terminal, authorization system and verification terminal
CN100533456C (en) Security code production method and methods of using the same, and programmable device therefor
CN101300808B (en) Method and arrangement for secure autentication
CN102103778B (en) Mobile payment system, mobile terminal and method for realizing mobile payment service
CN101131756B (en) Security authentication system, device and method for electric cash charge of mobile paying device
CN107358441B (en) Payment verification method and system, mobile device and security authentication device
US20090187980A1 (en) Method of authenticating, authorizing, encrypting and decrypting via mobile service
CN101866498B (en) Electronic ticket implementation method and system based on intelligent card
CN109617675B (en) Method and system for authenticating identifiers of both sides between charge and discharge facility and user terminal
CN104778773A (en) System and method for controlling entrance guard by mobile phone
CN101714195A (en) Digital certificate-based novel digital copyright protection method and device
CN103714639A (en) Method and system enabling safe operation of POS terminal to be achieved
CN103001773A (en) Fingerprint authentication system and fingerprint authentication method based on near field communication (NFC)
CN101790166A (en) Digital signing method based on mobile phone intelligent card
CN111787530A (en) Block chain digital identity management method based on SIM card
CN103326862A (en) Electronically signing method and system
CN102164128A (en) Online payment system and online payment method for Internet television
CN109889669A (en) A kind of unlocked by mobile telephone method and system based on secure cryptographic algorithm
CN102521777B (en) A kind of method and system realizing remote credit
CN112769574A (en) Key injection method and system, key management system, device and machine readable medium
CN102263792A (en) Wireless security key equipment, electronic commerce service system and method
CN107609878A (en) A kind of safety certifying method and system of shared automobile
CN105682092B (en) Bidirectional authentication method based on short-distance wireless communication technology
CN114238878A (en) Traceable data authorization transfer control method and system
CN109410056A (en) A kind of method that charging system for electric automobile realizes decentralization Secure Transaction

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee

Owner name: SHENZHEN NATIONZ ELECTRONIC COMMERCE CO., LTD.

Free format text: FORMER NAME: SHENZHEN ANGELSHINE CO., LTD.

CP03 Change of name, title or address

Address after: 518057 Guangdong city of Shenzhen province Nanshan District Gao Xin Road No. 009 Chinese Technology Development Institute Technology Park Building No. 3 tower 9 building A room

Patentee after: Shenzhen Nationz Electronic Commerce Co., Ltd.

Address before: 518057 Guangdong city of Shenzhen province Nanshan District Gao Xin Road No. 009 Chinese Technology Development Institute Technology Park Building No. three tower 19B1

Patentee before: Shenzhen Angelshine Co., Ltd.

CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20121114

Termination date: 20190925

CF01 Termination of patent right due to non-payment of annual fee